2.1 CVE-2011-4623

Patch
 

Ganzzahliger Überlauf in der Funktion rsCStrExtendBuf in runtime/stringbuf.c im imfile-Modul in rsyslog 4.x vor 4.6.6, 5.x vor 5.7.4 und 6.x vor 6.1.4 ermöglicht es lokalen Benutzern, einen Denial-of-Service (Daemon-Hang) über eine große Datei zu verursachen, was einen Heap-basierten Pufferüberlauf auslöst.
https://nvd.nist.gov/vuln/detail/CVE-2011-4623

Kategorien

CWE-189

Referenzen


 

CPE

cpe start ende
Configuration 1
cpe:2.3:a:rsyslog:rsyslog:4.5.6:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:4.1.2:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:4.5.1:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:4.6.3:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:4.5.2:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:4.1.1:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:4.4.2:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:4.6.4:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:4.5.4:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:4.3.2:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:4.1.3:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:4.5.3:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:4.6.1:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:4.1.0:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:4.5.8:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:4.1.5:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:4.3.0:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:4.6.2:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:4.5.5:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:4.4.0:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:4.6.0:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:4.5.0:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:4.1.7:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:4.2.0:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:4.4.1:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:4.3.1:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:4.6.5:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:4.1.6:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:4.1.4:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:4.5.7:*:*:*:*:*:*:*
Configuration 2
cpe:2.3:a:rsyslog:rsyslog:5.5.6:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.5.7:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.4.2:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.5.0:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.5.4:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.1.6:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.5.1:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.6.1:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.3.6:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.1.1:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.6.4:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.1.4:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.5.3:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.6.2:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.6.0:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.6.5:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.1.0:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.1.5:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.4.0:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.7.2:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.3.1:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.1.2:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.2.0:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.3.7:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.2.2:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.3.3:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.3.2:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.6.3:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.5.2:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.2.1:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.4.1:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.7.0:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.7.3:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.1.3:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.5.5:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.3.4:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.7.1:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.3.5:*:*:*:*:*:*:*
Configuration 3
cpe:2.3:a:rsyslog:rsyslog:6.1.1:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:6.1.0:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:6.1.3:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:6.1.2:*:*:*:*:*:*:*


REMEDIERUNG


Patch

Url
USN-1338-1


EXPLOITS


Exploit-db.com

id beschreibung datum
Keine bekannten Exploits

Andere (github, ...)

Url
Keine bekannten Exploits


CAPEC


Common Attack Pattern Enumerations and Classifications

id beschreibung schweregrad
Kein Eintrag


MITRE